SlideShare ist ein Scribd-Unternehmen logo
1 von 15
4.0 COMPUTER ETHICS
    AND SECURITY

 4.2 Computer Security
     4.2.2 Security Measures
LEARNING OUTCOMES:

   At the end of this topic, students should
    be able to:
       Identify different ways to overcome
        security risks.




                                                2
Security Measures


           Anti-virus   Anti-spyware


Cryptography                     Firewall



 Data             Security              Human
backup            Measures              aspect:
                                       awareness
1.Anti-virus
A software use to protect computers against
viruses by identifying and removing any
computer virus found in memory, on storage
media, or in incoming files.
Example:
  • McAfee VirusScan
  • Norton AntiVirus
  • AVG Anti-Virus
  • avast! Antivirus
Most anti-virus program also protect against
other malware.
2.Anti-spyware


Programs that detect and deletes spyware
Example :
      Ad-Aware
      Spy Sweeper
      Windows Defender
3.Firewall
• A firewall is hardware and/or software that
  protects a network’s resources from intrusion

 Hardware firewall is a built-in feature in routers
 that prevents unauthorized users from accessing
 files and computers in a network.
Firewall
Firewall
4. Data backup

• A backup is a duplicate of a file, program, or disk
  that can be used if the original is lost, damaged,
  or destroyed
  – To back up a file means to make a copy of it


• Offsite backups are stored in a location separate
  from the computer site           Cloud
                                    Storage
Data backup
• Two categories of           • In the case of system
  backups:                      failure, you can
  – Full backup – copies        restore the file by
    all the files in the        copying the backed
    computer                    up files to their
  – Selective backup –          original location on
    choose which folder         the computer.
    and files to include in
    backup
5.Cryptography
The art of protecting information by transforming
it (encrypting it) into an unreadable format
Technology of encoding information so it can
only be read by authorized individuals

   Encryption
 Process of converting readable data into unreadable
 characters to prevent unauthorized access.

    Decryption
 Process to decode encrypted data
Cryptography
Cryptography
How ?
To read the data, you must decrypt it into readable
form.
The unencrypted data is called plain text.
The encrypted data is called cipher text.
To encrypt, plain text converted into cipher text using
an encryption key.

Importance ?
The process of proving one's identity.
Ensuring that no one can read the message except the
intended receiver.
6.Human Aspects: Awareness

   Expose employees or staff to computer
    security

   Make a routine check to update from
    new virus, worm or other malicious
    threat.

   Proper handling of computer and
    information
Computer Security                         a

Computer Security Risk          Security Measure
  Internet and network attack          Anti-virus
                                     Anti-spyware
                                        Firewall
                                Human Aspect-Awareness
 Unauthorized access and use           Firewall
                                Human Aspect-Awareness
        Hardware theft               Data backup
                                Human Aspect-Awareness
        Software theft               Data backup
                                Human Aspect-Awareness
       Information theft             Data backup
                                    Cryptography
                                Human Aspect-Awareness
        System failure               Data backup
                                Human Aspect-Awareness

Weitere ähnliche Inhalte

Was ist angesagt?

Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Security Measures
Security MeasuresSecurity Measures
Security Measureshanna91
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1AfiqEfendy Zaen
 

Was ist angesagt? (20)

Security technologies
Security technologiesSecurity technologies
Security technologies
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
System security
System securitySystem security
System security
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Email security
Email securityEmail security
Email security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Information Security
Information SecurityInformation Security
Information Security
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Network security
Network securityNetwork security
Network security
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 

Andere mochten auch

Andere mochten auch (6)

Trading ppt
Trading pptTrading ppt
Trading ppt
 
Trading of securities
Trading of securitiesTrading of securities
Trading of securities
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 

Ähnlich wie 3.2.2 security measures

Ähnlich wie 3.2.2 security measures (20)

Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
Notacd02
Notacd02Notacd02
Notacd02
 
Notacd02
Notacd02Notacd02
Notacd02
 
Data security
Data securityData security
Data security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Security management(new) (1)
Security management(new) (1)Security management(new) (1)
Security management(new) (1)
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Security Procedures
Security ProceduresSecurity Procedures
Security Procedures
 
Bettyboop
BettyboopBettyboop
Bettyboop
 
Computer security
Computer securityComputer security
Computer security
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
Security measure
Security measureSecurity measure
Security measure
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
SECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptxSECURITY AND ETHICS.pptx
SECURITY AND ETHICS.pptx
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from Patents
 

Mehr von hazirma

2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquettehazirma
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of websitehazirma
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4hazirma
 
2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isphazirma
 
2.2.1.1 evolution of internet
2.2.1.1 evolution of internet2.2.1.1 evolution of internet
2.2.1.1 evolution of internethazirma
 
2.1.1 network topology
2.1.1 network topology2.1.1 network topology
2.1.1 network topologyhazirma
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of websitehazirma
 
Tutorial pdt sem 1
Tutorial pdt sem 1Tutorial pdt sem 1
Tutorial pdt sem 1hazirma
 
3.1.1 computer ethics
3.1.1 computer ethics3.1.1 computer ethics
3.1.1 computer ethicshazirma
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet serviceshazirma
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquettehazirma
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of websitehazirma
 
C topic 3.3 the internet services 2
C topic 3.3 the internet services 2C topic 3.3 the internet services 2
C topic 3.3 the internet services 2hazirma
 
2.2.2.4 Information Searching
2.2.2.4 Information Searching2.2.2.4 Information Searching
2.2.2.4 Information Searchinghazirma
 
2.2.2.2 Web Address
2.2.2.2 Web Address2.2.2.2 Web Address
2.2.2.2 Web Addresshazirma
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browserhazirma
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizahhazirma
 
2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigationhazirma
 

Mehr von hazirma (20)

2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4
 
2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp
 
2.2.1.1 evolution of internet
2.2.1.1 evolution of internet2.2.1.1 evolution of internet
2.2.1.1 evolution of internet
 
2.1.1 network topology
2.1.1 network topology2.1.1 network topology
2.1.1 network topology
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of website
 
Tutorial pdt sem 1
Tutorial pdt sem 1Tutorial pdt sem 1
Tutorial pdt sem 1
 
3.1.1 computer ethics
3.1.1 computer ethics3.1.1 computer ethics
3.1.1 computer ethics
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet services
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquette
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of website
 
C topic 3.3 the internet services 2
C topic 3.3 the internet services 2C topic 3.3 the internet services 2
C topic 3.3 the internet services 2
 
2.2.2.4 Information Searching
2.2.2.4 Information Searching2.2.2.4 Information Searching
2.2.2.4 Information Searching
 
2.2.2.2 Web Address
2.2.2.2 Web Address2.2.2.2 Web Address
2.2.2.2 Web Address
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browser
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah
 
2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation
 

3.2.2 security measures

  • 1. 4.0 COMPUTER ETHICS AND SECURITY 4.2 Computer Security 4.2.2 Security Measures
  • 2. LEARNING OUTCOMES:  At the end of this topic, students should be able to:  Identify different ways to overcome security risks. 2
  • 3. Security Measures Anti-virus Anti-spyware Cryptography Firewall Data Security Human backup Measures aspect: awareness
  • 4. 1.Anti-virus A software use to protect computers against viruses by identifying and removing any computer virus found in memory, on storage media, or in incoming files. Example: • McAfee VirusScan • Norton AntiVirus • AVG Anti-Virus • avast! Antivirus Most anti-virus program also protect against other malware.
  • 5. 2.Anti-spyware Programs that detect and deletes spyware Example :  Ad-Aware  Spy Sweeper  Windows Defender
  • 6. 3.Firewall • A firewall is hardware and/or software that protects a network’s resources from intrusion Hardware firewall is a built-in feature in routers that prevents unauthorized users from accessing files and computers in a network.
  • 9. 4. Data backup • A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed – To back up a file means to make a copy of it • Offsite backups are stored in a location separate from the computer site Cloud Storage
  • 10. Data backup • Two categories of • In the case of system backups: failure, you can – Full backup – copies restore the file by all the files in the copying the backed computer up files to their – Selective backup – original location on choose which folder the computer. and files to include in backup
  • 11. 5.Cryptography The art of protecting information by transforming it (encrypting it) into an unreadable format Technology of encoding information so it can only be read by authorized individuals Encryption Process of converting readable data into unreadable characters to prevent unauthorized access. Decryption Process to decode encrypted data
  • 13. Cryptography How ? To read the data, you must decrypt it into readable form. The unencrypted data is called plain text. The encrypted data is called cipher text. To encrypt, plain text converted into cipher text using an encryption key. Importance ? The process of proving one's identity. Ensuring that no one can read the message except the intended receiver.
  • 14. 6.Human Aspects: Awareness  Expose employees or staff to computer security  Make a routine check to update from new virus, worm or other malicious threat.  Proper handling of computer and information
  • 15. Computer Security a Computer Security Risk Security Measure Internet and network attack Anti-virus Anti-spyware Firewall Human Aspect-Awareness Unauthorized access and use Firewall Human Aspect-Awareness Hardware theft Data backup Human Aspect-Awareness Software theft Data backup Human Aspect-Awareness Information theft Data backup Cryptography Human Aspect-Awareness System failure Data backup Human Aspect-Awareness